What is CybOX?

What is CybOX? It is a specification for an application layer protocol that allows the communication of CTI over HTTPS. It is a set of standardized schemata for specifying, capturing,…

Comments Off on What is CybOX?

Which organization defines unique CVE Identifiers for publicly known information-security vulnerabilities that make it easier to share data?

Which organization defines unique CVE Identifiers for publicly known information-security vulnerabilities that make it easier to share data? Cisco Talos MITRE FireEye DHS Answers Explanation & Hints: The United States…

Comments Off on Which organization defines unique CVE Identifiers for publicly known information-security vulnerabilities that make it easier to share data?

How does FireEye detect and prevent zero-day attacks?

How does FireEye detect and prevent zero-day attacks? by keeping a detailed analysis of all viruses and malware by establishing an authentication parameter prior to any data exchange by only…

Comments Off on How does FireEye detect and prevent zero-day attacks?

What is the primary function of the Center for Internet Security (CIS)?

What is the primary function of the Center for Internet Security (CIS)? to provide vendor-neutral education products and career services to industry professionals worldwide to provide a security news portal…

Comments Off on What is the primary function of the Center for Internet Security (CIS)?

How does AIS address a newly discovered threat?

How does AIS address a newly discovered threat? by enabling real-time exchange of cyberthreat indicators with U.S. Federal Government and the private sector by creating response strategies against the new…

Comments Off on How does AIS address a newly discovered threat?

Which type of security attack would attempt a buffer overflow?

Which type of security attack would attempt a buffer overflow? reconnaissance ransomware DoS scareware Answers Explanation & Hints: Denial of service (DoS) attacks attempt to disrupt service on the network…

Comments Off on Which type of security attack would attempt a buffer overflow?

Which statement describes one of the rules that govern interface behavior in the context of implementing a zone-based policy firewall configuration?

Which statement describes one of the rules that govern interface behavior in the context of implementing a zone-based policy firewall configuration? An administrator can assign an interface to multiple security…

Comments Off on Which statement describes one of the rules that govern interface behavior in the context of implementing a zone-based policy firewall configuration?

An attacker is redirecting traffic to a false default gateway in an attempt to intercept the data traffic of a switched network. What type of attack could achieve this?

An attacker is redirecting traffic to a false default gateway in an attempt to intercept the data traffic of a switched network. What type of attack could achieve this? DHCP…

Comments Off on An attacker is redirecting traffic to a false default gateway in an attempt to intercept the data traffic of a switched network. What type of attack could achieve this?

Which type of network attack involves randomly opening many Telnet requests to a router and results in a valid network administrator not being able to access the device?

Which type of network attack involves randomly opening many Telnet requests to a router and results in a valid network administrator not being able to access the device? man-in-the-middle DNS…

Comments Off on Which type of network attack involves randomly opening many Telnet requests to a router and results in a valid network administrator not being able to access the device?

Which of the following characteristics describe a worm?

Which of the following characteristics describe a worm? Select two correct answers Infects computers by attaching to software code Executes when software is run on a computer Is self-replicating Travels…

Comments Off on Which of the following characteristics describe a worm?

What are two examples of DoS attacks? (Choose two.)

What are two examples of DoS attacks? (Choose two.) buffer overflow SQL injection ping of death port scanning phishing Answers Explanation & Hints: The buffer overflow and ping of death…

Comments Off on What are two examples of DoS attacks? (Choose two.)

A user is curious about how someone might know a computer has been infected with malware. What are two common malware behaviors? (Choose two.)

A user is curious about how someone might know a computer has been infected with malware. What are two common malware behaviors? (Choose two.) The computer beeps once during the…

Comments Off on A user is curious about how someone might know a computer has been infected with malware. What are two common malware behaviors? (Choose two.)